Oddbean new post about | logout
 The weapon thesis is we use physical power to secure every other domain of objective physical reality.

We are now using physical power to secure cyberspace. 
 I understand that. How does one attack with bitcoin? 
 you guys are making an entire thread without spelling "software" correctly !
that is blatherbot work 
 One doesn’t. This whole idea that bitcoin is a weapon (which was walked back by lowry) is nonsense. An honest decentralized ledger is not  ‘power projection’ that will take your enemies down. Watch the TFTC podcast with Jason, he couldn’t come up with one example of how bitcoin’s hashrate secures anything other than bitcoin. He claims that somehow putting info behind a bitcoin paywall is revolutionary. Very skeptical about the whole thing. Lopp has a good article responding to his thesis. 
 How you should think about it is simply in terms of physical security. Not necessarily offense or defense.

The physically costly bits of information secured by proof-of-work can be used to drastically increase the cost of attacking your computer network to the point where it's literally too physically costly for any attackers to even attempt attacking.

A weapon can be either passive or active physical power projection.

A wall is technically a passive physical power projection weapon.

People think in terms of offense and defense.. but the right way to think of it is passive and active tactics, techniques, and technologies that allow you to achieve physical security. 
 > The physically costly bits of information secured by proof-of-work can be used to drastically increase the cost of attacking your computer network to the point where it's literally too physically costly for any attackers to even attempt attacking.

What bits are secured aside from the time chain ledger? This is general hand waving. How do you secure something other than bitcoin using bitcoin? 
 Design an API that requires all control actions, or especially sensitive control actions to be stamped with X amount of bitpower, therefore verifying a superfluous physical cost was paid to send the control signal.

It's not actually that complicated lmao. 
 > Design an API

This is exactly what I’m asking for. I don’t think you can. I don’t think anyone can. Lots of theories fall flat at practical application and I think softwar is one of them. Cool theory, doesn’t work in practice. 

> it’s not actually that complicated lmao. 

So give me the concrete design for the API and stop with the theoretical word salad. I understand the thesis and all it entails. Doesn’t mean shit if you can’t deliver functioning code. 
 Who says functioning code hasn't already been implemented. Bitcoins network PROVES this concept is totally valid.  
 You have circular logic. Good luck. Let me know when you have bitcoin protecting some other system than itself in cyberspace. 
 Military is already doing it. 
 Do tell. (Former DoD Intel for 11yrs until 2019) 
 2019 was a long time ago. 
 Agreed. 👌 
 Is this implying that some is running something "Turing complete" on btc? 
 It implies a lot. None of it verifiable. 
 How does Bitcoins network ensure the people running it don't bypass its requirements or enforce its security?

 
 Economic consistency. Predictability. All valuable to bitcoins layer 0 - the people. 
 The real answer is physical power. 
 Right. Meat space. My question is around cyberspace. 
 The Bitcoin protocol is a brute-force physical power digitization protocol. 
 Nodes enforce the rules not miners. Have all the hash rate you want but if the block proposed doesn’t abide by the rules nodes will reject it. The meat space constraints (energy) only affect who gets to update the ledger. No? 
 Right. Meat space. My question is around cyberspace. 
 The Bitcoin protocol is a brute-force physical power digitization protocol. 
 Nodes enforce the rules not miners. Have all the hash rate you want but if the block proposed doesn’t abide by the rules nodes will reject it. The meat space constraints (energy) only affect who gets to update the ledger. No?